• 제목/요약/키워드: radio access technology

검색결과 259건 처리시간 0.034초

Cloud Radio Access Network: Virtualizing Wireless Access for Dense Heterogeneous Systems

  • Simeone, Osvaldo;Maeder, Andreas;Peng, Mugen;Sahin, Onur;Yu, Wei
    • Journal of Communications and Networks
    • /
    • 제18권2호
    • /
    • pp.135-149
    • /
    • 2016
  • Cloud radio access network (C-RAN) refers to the virtualization of base station functionalities by means of cloud computing. This results in a novel cellular architecture in which low-cost wireless access points, known as radio units or remote radio heads, are centrally managed by a reconfigurable centralized "cloud", or central, unit. C-RAN allows operators to reduce the capital and operating expenses needed to deploy and maintain dense heterogeneous networks. This critical advantage, along with spectral efficiency, statistical multiplexing and load balancing gains, make C-RAN well positioned to be one of the key technologies in the development of 5G systems. In this paper, a succinct overview is presented regarding the state of the art on the research on C-RAN with emphasis on fronthaul compression, baseband processing, medium access control, resource allocation, system-level considerations and standardization efforts.

5G New Radio Access Technology를 위한 Radio over Fiber 시스템의 수용가능성 연구 (Study on Applicability of Radio over Fiber system for 5G New Radio Access Technology)

  • 김성만
    • 한국전자통신학회논문지
    • /
    • 제11권9호
    • /
    • pp.849-854
    • /
    • 2016
  • 현재 이동통신망에서 요구되는 많은 통신량을 수용하기 위해서 새로운 주파수 대역을 사용하는 5G New RAT(: Radio Access Technology) 에 대한 연구가 활발히 진행되고 있다. 하지만, 이러한 새로운 New RAT 기술이 이동통신에 적용되었을 때에 이를 유선 이동통신망에서 수용할 수 있을지에 대해서는 제대로 연구된 바가 없다. 따라서, 본 연구에서는 이러한 New RAT 기술을 RoF(: Radio over Fiber) 기술로 이동통신망의 Fronthaul에서 수용이 가능한지에 대한 연구를 진행하였다. 본 연구에서는 New RAT 의 기술로 밀리미터파 통신기술, 테라헤르츠파 통신기술, 무선 광통신 기술 등을 고려하고, 이들 각각에 대한 RoF 기술의 응용 가능성을 연구하였다. 연구의 결론을 요약하면, 10 년 이내의 범위에서 세 가지 New RAT 기술 중에 밀리미터파 통신기술에 대해서만 RoF 수용성을 고려하면 되는 것으로 판단되며, 빔포밍을 사용하는 경우에는 밀리미터파 통신기술의 요구 전송 대역폭이 너무 많아 Fronthaul 에서 RoF 기술로도 수용이 쉽지 않은 것으로 결론이 내려졌다.

분산 안테나 시스템에 기반한 무선 액세스망 가상화 (Wireless Access Network Virtualization Based on Distributed Antenna Systems)

  • 김수민;정방철
    • 한국정보통신학회논문지
    • /
    • 제16권10호
    • /
    • pp.2085-2094
    • /
    • 2012
  • 본 논문에서는 다수 무선 접속 기술 (Radio Access Technology; RAT)이 통합되어 운용되는 셀룰러 네트워크에서 차세대 이동통신 네트워크 진화 방향인 디지털 유닛 (DU)-라디오 유닛 (RU) 분리 구조를 기본으로 무선 액세스 네트워크 가상화 알고리즘을 제안한다. 제안 무선 액세스 네트워크 가상화 알고리즘은 크게 기본 액세스 네트워크 가상화, RAT 가상화, 액세스 경로 이주 알고리즘으로 구성되고, 순차적인 수행을 통하여 최종 무선 액세스 네트워크 가상화가 이루어진다. 제안 무선 액세스 네트워크 가상화 알고리즘은 3GPP LTE와 WiMAX의 두 무선 접속 기술을 예제로 한 시스템 레벨 시뮬레이션을 통하여 시스템 수율 측면에서 성능이 평가된다. 이 때, 네트워크 트래픽 로드의 비대칭성에 따른 두 가지 시나리오를 고려하고, 제안 무선 액세스 네트워크 가상화 알고리즘은 비대칭적 네트워크 트래픽 로드와 사용자 분포 상황에서도 상당한 성능 이득을 성취한다.

An Investigation of Satellite Radio Access Technology for Beyond IMT-2000 Systems

  • Kang Kunseok;Ryoo Sunheui;Kim Byoung Gi;Kim Sooyoung;Ahn Do Seob
    • Journal of Communications and Networks
    • /
    • 제7권2호
    • /
    • pp.135-143
    • /
    • 2005
  • This paper presents an investigation of satellite radio access technology for beyond IMT-2000 systems. Although we could not see any active role of a satellite system in the 3G networks, satellite system will provide strong advantages in future systems for certain applications. Because a satellite link has longer round trip delay than a terrestrial link, we need technologies that would make the satellite component especially efficient. After presenting the satellite radio interface of the 3G system, we suggest several points which need to be considered in the beyond 3G systems. We also suggest a few candidate technologies with various simulation results.

Link Error Analysis and Modeling for Video Streaming Cross-Layer Design in Mobile Communication Networks

  • Karner, Wolfgang;Nemethova, Olivia;Svoboda, Philipp;Rupp, Markus
    • ETRI Journal
    • /
    • 제29권5호
    • /
    • pp.569-595
    • /
    • 2007
  • Particularly in wireless communications, link errors severely affect the quality of the services due to the high error probability and the specific error characteristics (burst errors) in the radio access part of the network. In this work, we show that thorough analysis and appropriate modeling of radio-link error behavior are essential to evaluate and optimize higher layer protocols and services. They are also the basis for finding network-aware cross-layer processing algorithms which are capable of exploiting the specific properties of the link error statistics, such as predictability. This document presents the analysis of the radio link errors based on measurements in live Universal Mobile Telecommunication System (UMTS) radio access networks as well as new link error models originating from that analysis. It is shown that the knowledge of the specific link error characteristics leads to significant improvements in the quality of streamed video by applying the proposed novel network- and content-aware cross-layer scheduling algorithms. Although based on live UMTS network experience, many of the conclusions in this work are of general validity and are not limited to UMTS only.

  • PDF

Optimal Opportunistic Spectrum Access with Unknown and Heterogeneous Channel Dynamics in Cognitive Radio Networks

  • Zhang, Yuli;Xu, Yuhua;Wu, Qihui;Anpalagan, Alagan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권8호
    • /
    • pp.2675-2690
    • /
    • 2014
  • We study the problem of optimal opportunistic spectrum access with unknown and heterogeneous channel dynamics in cognitive radio networks. There is neither statistic information about the licensed channels nor information exchange among secondary users in the respective systems. We formulate the problem of maximizing network throughput. To achieve the desired optimization, we propose a win-shift lose-stay algorithm based only on rewards. The key point of the algorithm is to make secondary users tend to shift to another channel after receiving rewards from the current channel. The optimality and the convergence of the proposed algorithm are proved. The simulation results show that for both heterogeneous and homogenous systems the proposed win-shift lose-stay algorithm has better performance in terms of throughput and fairness than an existing algorithm.

WIBRO 시스템의 Radio over Fiber에 의한 Access Point 접속구도 (Access Point Interface Configuration using Radio over Fiber for the WIBRO System)

  • 송주빈;김영일
    • 한국항행학회논문지
    • /
    • 제9권2호
    • /
    • pp.93-102
    • /
    • 2005
  • 본 논문은 휴대인터넷시스템의 수동피코셀 제안과 엑세스포인트와 수동형 피코셀간의 ROF(Radio over Fiber)접속 구도에 대한 것이다. 휴대인터넷시스템(Wibro)은 시속 60km의 중속도의 이동 단말에 50Mbps의 IP 기반 데이터서비스를 제공하는 것이다. 따라서 서비스를 제공하기 위하여 초기에 셀의 구축비용을 최소화 하는 것이 요구된다. 본 논문은 이러한 요구사항을 만족하는 수동형 피코셀을 제안하고 이의 접속구도에 대하여 제안한 것이다. 기존의 FP(Fabry-Perot) 레이저를 채용하는 경우 ROF 링크의 비선형 특성을 측정하여 Wibro시스템에 접속 가능성을 검증하였다.

  • PDF

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

Performance Analysis and Power Allocation for NOMA-assisted Cloud Radio Access Network

  • Xu, Fangcheng;Yu, Xiangbin;Xu, Weiye;Cai, Jiali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권3호
    • /
    • pp.1174-1192
    • /
    • 2021
  • With the assistance of non-orthogonal multiple access (NOMA), the spectrum efficiency and the number of users in cloud radio access network (CRAN) can be greatly improved. In this paper, the system performance of NOMA-assisted CRAN is investigated. Specially, the outage probability (OP) and ergodic sum rate (ESR), are derived for performance evaluation of the system, respectively. Based on this, by minimizing the OP of the system, a suboptimal power allocation (PA) scheme with closed-form PA coefficients is proposed. Numerical simulations validate the accuracy of the theoretical results, where the derived OP has more accuracy than the existing one. Moreover, the developed PA scheme has superior performance over the conventional fixed PA scheme but has smaller performance loss than the optimal PA scheme using the exhaustive search method.

전술 무선통신망의 응답시간 및 처리량 개선을 위한 비대칭 다중접속기법 설계 및 성능분석 (Design and Performance Analysis of Asymmetric Time Division Multiple Access Method for Improving Response Time and Throughput in Tactical Radio Communication)

  • 권용현;차중혁;김동성
    • 한국군사과학기술학회지
    • /
    • 제21권3호
    • /
    • pp.361-369
    • /
    • 2018
  • This paper proposes a design of asymmetric time division multiple access method for tactical radio communication. Typical tactical radio communication has a limited execution of transmission, because uplink message requires more extended response time than downlink message. In order to solve this problem, this paper analyzes operational environment of Korean tactical radio communication and proposes an asymmetric TDMA based on it for performance of tactical communication. The simulation model is used to investigate constraints of real experiments for proving effectiveness of the proposed approach. Simulations results show that the proposed scheme outperforms the conventional scheme in terms of throughput, response time, and delay.